关注
Dorothy Denning
Dorothy Denning
Professor of Defense Analysis, Naval Postgraduate School
在 nps.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
An intrusion-detection model
DE Denning
IEEE Transactions on software engineering, 222-232, 1987
63911987
Cryptography and Data Security
DE Denning
Addison-Wesley, 1982
35071982
A lattice model of secure information flow
DE Denning
Communications of the ACM 19 (5), 236-243, 1976
29421976
Certification of programs for secure information flow
DE Denning, PJ Denning
Communications of the ACM 20 (7), 504-513, 1977
15681977
Timestamps in key distribution protocols
DE Denning, GM Sacco
Communications of the ACM 24 (8), 533-536, 1981
13031981
Information warfare and security
DER Denning
Addison-Wesley, 1999
12251999
Activism, hacktivism, and cyberterrorism: The Internet as a tool for influencing foreign policy
DE Denning
Networks and netwars: The future of terror, crime, and militancy 239, 288, 2001
9152001
Method and apparatus for authenticating the location of remote users of networked computing systems
PF MacDoran, MB Mathews, FA Ziel, KL Gold, SM Anderson, MA Coffey, ...
US Patent 5,757,916, 1998
5291998
The SeaView security model
TF Lunt, DE Denning, RR Schell, M Heckman, WR Shockley
IEEE Transactions on software engineering 16 (6), 593-607, 1990
4851990
Cyberterrorism: Testimony before the special oversight panel on terrorism committee on armed services US House of Representatives
DE Denning
Focus on terrorism 9 (1), 71-76, 2000
435*2000
Location-based authentication: Grounding cyberspace for better security
DE Denning, PF MacDoran
Computer Fraud & Security 1996 (2), 12-16, 1996
3671996
Requirements and model for IDES-a real-time intrusion-detection expert system
D Denning, PG Neumann
SRI International, 1985
3521985
The tracker: A threat to statistical database security
DE Denning, PJ Denning
ACM Transactions on Database Systems (TODS) 4 (1), 76-96, 1979
3371979
Data security
DE Denning, PJ Denning
ACM computing surveys (CSUR) 11 (3), 227-249, 1979
3361979
System and method for delivering encrypted information in a communication network using location identity and key tables
DE Denning, BJ Glick, RS Karpf, ME Seiler
US Patent 7,143,289, 2006
3092006
Secure statistical databases with random sample queries
DE Denning
ACM Transactions on Database Systems (TODS) 5 (3), 291-315, 1980
3071980
A taxonomy for key escrow encryption systems
DE Denning, DK Branstad
Communications of the ACM 39 (3), 34-40, 1996
2991996
A multilevel relational data model
DE Denning, TF Lunt
1987 IEEE Symposium on Security and Privacy, 220-220, 1987
2621987
Honeyfiles: deceptive files for intrusion detection
J Yuill, M Zappe, D Denning, F Feer
Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop …, 2004
2292004
Views for multilevel database security
DE Denning, SG Akl, M Heckman, TF Lunt, M Morgenstern, PG Neumann, ...
IEEE Transactions on Software Engineering, 129-140, 1987
2241987
系统目前无法执行此操作,请稍后再试。
文章 1–20